Applying Eye Tracking in Information Security

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Use of eye tracking technology in eating disorders: Review Study

Eating disorders are among the topics of interest to many researchers and have been studied from several perspectives. According to the Diagnostic and Statistical Manual of Mental Disorders (DSM), these disorders include persistent eating disorders or eating-related behaviors and have different types such as anorexia nervosa, bulimia nervosa, binge-eating disorder, pica, and other disorders tha...

متن کامل

Applying Real Options Thinking to Information Security in Networked Organizations

An information security strategy of an organization participating in a networked business sets out the plans for designing a variety of actions that ensure confidentiality, availability, and integrity of company’s key information assets. The actions are concerned with authentication and nonrepudiation of authorized users of these assets. We assume that the primary objective of security efforts ...

متن کامل

Three-dimensional information in face recognition: an eye-tracking study.

One unresolved question about face perception is: what is the role of three-dimensional information in face recognition? In this study, recognition performance was compared across changes in viewpoint in different depth conditions: a 2D condition without stereo information and a 3D condition where stereo information was present (by viewing the same face images as anaglyphs through 3D glasses). ...

متن کامل

Applying the OSI Seven Layer Network Model To Information Security

Data networking is a critical area of focus in the study of information security. This paper focuses on reviewing a key area of data networking theory The Open Systems Interconnect (OSI) Seven Layer Network Model. This paper demonstrates the application of the model’s concepts into the context of information security. This paper overall presents the perspective that common information security ...

متن کامل

Identifying Information Security Risk Components in Military Hospitals in Iran

Background and Aim: Information systems are always at risk of information theft, information change, and interruptions in service delivery. Therefore, the present study was conducted to develop a model for identifying information security risk in military hospitals in Iran. Methods: This study was a qualitative content analysis conducted in military hospitals in Iran in 2019. The sample consist...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Procedia Computer Science

سال: 2019

ISSN: 1877-0509

DOI: 10.1016/j.procs.2019.02.062